Ves tige (véŝ tĭj) n. 1. A visible trace, evidence or sign of something that has once existed but now no longer exists or appears.
|
|
- Gwenda Laureen Black
- 5 years ago
- Views:
Transcription
1 Ves tige (véŝ tĭj) n. 1. A visible trace, evidence or sign of something that has once existed but now no longer exists or appears.
2 Obtaining & Using Social Media Evidence Using Social Media to Make Your Case June 7, 2018
3 Overview Define Social Media Differences to Traditional Digital Forensics What You Need to Know Q&A
4 Intro to Social Media
5 Definition The use of web-based and mobile technologies that enable people to communicate easily via the Internet to share information and resources.
6 Popular Social Media Sites
7 Unique Visits in Millions
8 The Big Billion Unique Users Monthly Visitors 467 Million Accounts 330 Million average monthly active accounts
9 A Comparison Social Media v Traditional Digital Forensics
10 Traditional Digital Forensics Approach
11 98% Rule On Display Written to Device Artifact & Other Never Displayed 110% Rule?
12 Correspondence Memos s Instant messages Faxes Deleted Old and forgotten
13 Business Records Financial data Assets Calculations PRIOR DRAFTS DELETED DRAFTS Projections Everything you could imagine
14 Every Website visited All pictures from those websites Every Website from popups and popunders All maps, from Mapquest for example
15 Every INTERNET SEARCH And Search Results
16 What you can expect Conceptual Analysis How the computer was used IMs s Web-based s Deletion activity Wiping activity Software installed File Transfers CD/DVD burning Attached hardware Other networks attached Remote Access activity Do we have the Right system?
17 Acquisition Completeness The Whole Truth Used & Unused (Unallocated) Space Active & Inactive Systems Seemingly Inaccessible Systems & Media
18 Acquisition Methodology Forensically-sound Bit-for-Bit Clone Copy, clone, mirror Write-protect Place on Sterile Media MD5 or other authentication hash Chain of Custody Seal Evidence
19 Authentication Authenticate: Prove no change Prove Clones ARE the Same Method MD5 Hash (digital fingerprint) Industry-standard, industry-recognized 128-bit 1 in 1x10 38 chance for deceiving 8 times more likely to win Missouri Powerball (1 in 120,000,000) 1 in 700,000 chance of being struck by lightning
20 Authenticate Our Methodology MD5 Hash Digital Fingerprint MD f9ebd7478f bab050ed6b4612f0
21 Authenticate Prove copies (working) are the same COPY f9ebd7478fbab050ed6b4612f f9ebd7478fbab050ed6b4612f0
22 Authenticate Prove nothing has changed f9ebd7478fbab050ed6b4612f f9ebd7478fbab050ed6b4612f0
23 There is a difference Comparing Social Media to Traditional Digital Forensics
24 Best Source Traditional: Interacting Device Clone Social Media: Service Provider Subpoena/Search Warrant Account information IP address Activity conducted Referer information
25 Thoroughness Traditional: Cloning w/ Hashing Social Media: Use of APIs At mercy of service provider, as APIs only expose what the provider wants exposed Public / Private Views May need to be part of the individual s social circle to see everything
26 Dynamic Traditional: Slow-changing. Snapshot today likely captures everything Social Media: Changes by the minute Implication constant capturing/monitoring
27 Deleted Information Traditional: Relatively Easy Social Media: Difficult, if not impossible
28 What you Need to Know
29 Categorical Evidence Social Footprint Connections Communication Pattern who & when Pix & Vids Uploaded? Tagged within? Times of Activity When event occurred Apps Which? Purpose? Inferences?
30 Uses Background checks Impeach witness Determine position or acknowledgment of fact/circumstance Proof of association between individuals Evidence of intent, predisposition or motive Physical location alibi Locating assets Establish habits/routines
31 Facebook
32 Evidence Available on Device JSON snippets Cached pictures Some activity timelines Memory remnants
33 Evidence Available Online Public Profile Private Profile (i.e. friend or via credentials) Posts Messages User Information Friends / network Albums News Feed Wall Groups Videos Links
34 Evidence Available from Facebook Subpoena / Search Warrant Required Specific Post Information Specific Metadata Associated with Item URI, fb_item_type, parent_itemnum, thread_id, album_id, post_id, etc Temporal Data created_time, updated_time Ownership Data User_id, user_img, TO, to_id Other probative information Application used to post to facebook (i.e. iphone, social media client, web-site, etc.)
35 Evidence Available from Facebook Subpoena / Search Warrant Required Basic Subscriber Information (Neoselect) User Identification Number (FaceBook ID) address Date & Timestamp of account creation date Most Recent Logins Registered Mobile number Expanded Subscriber Information (Neoprint) Profile Contact information Mini-feed Status Update History Shares Notes Wall Postings Friend Listing with Friends Facebook IDs Groups Listing with Facebook Group IDs Future and Past Events Video Listing, with filename
36 Evidence Available from Facebook Subpoena/Search Warrant Required User Photos Group Information Private Messages IP Logs Limited & can be incomplete
37 fax: mail: Facebook, Inc ATTN: Security Department/Custodian of Records 1601 California Ave Palo Alto, CA NOTE: Facebook does notify end-user that their information is being requested. Facebook does not accept legal process for Facebook.com must be Facebook, Inc.
38 LinkedIn
39 Evidence Available on Device JSON snippets Cached pictures Some activity timelines Memory remnants
40 Evidence Available Online Public Profile Private Profile (i.e. friend or via credentials) Statuses Network Updates Connections Profile Group Information & Discussions
41 Evidence Available from LinkedIn Subpoena / Search Warrant Required Basic Subscriber Information Member Identification Number (LinkedIn ID) address Date & Timestamp of account creation date Billing Information Snapshot of Member Profile Page Profile Summary Experience Education Recommendations Groups Network Update Stream User Profile photo IP Logs IP Address Data Account Visited Quantity of visits from that IP address
42 fax: mail: LinkedIn Corporation ATTN: Legal Department 2029 Stierlin Court Mountain View, CA NOTE: LinkedIn does notify end-user that their information is being requested.
43 Twitter
44 Anatomy of a Tweet Twitter Mathematics OR When is 280 characters not 280 characters? This message is 280 characters long. It is a demonstration to show the amount of data that can exist within a single Tweet. Short & Sweet! The preceding exclamation point is the old limit of 140 characters. Currently Tweets may contain 280 characters giving you more to play with
45 Anatomy of a Tweet Unique Tweet ID Screen name of user ID of reply Author s user name Author s screen name Author s location (free-form) Author s biography Creation date of account Timezone Number of users author is following Number of favorites this user has User s language Number of followers this user has Geolocation Info Application that sent the Tweet And probably more
46 Evidence Available on Device JSON snippets Memory remnants Tweet contents itself
47 Evidence Available Online Public Profile / Private* -- Blurred Timeline Mentions Messages Favorites My Tweets* Followers / Followees Web-pages linked in Tweets YouTube video links found in Tweets Library of Congress Archival Project
48 Evidence Available from Twitter Subpoena / Search Warrant Required Twitter Account Information Account Profile Profile Photo Header Photo Background Image Location (self-completed) URL Bio Status Updates (Tweets) IP Logs NOTE: Twitter does not require real name use, verification or any identity authentication.
49 fax: (attn: Trust & Safety Legal Policy) mail: Twitter, Inc c/o Trust & Safety Legal Policy 1355 Market St., Ste. 900 San Francisco, CA NOTE: Information above is for Law Enforcement Twitter does notify end-user that their information is being requested.
50 Final Considerations Legal & Privacy Issues
51 Legal Issues Authentication FRE 901(a) must offer evidence sufficient to support a finding that the matter in question is what its proponent claims FRE 901(b)(4) can authenticate ESI with circumstantial evidence, reflecting: contents, substance, internal patterns or other distinctive characteristics Court rulings: Metadata supports this
52 Legal Issues Enter FRE 902 (13) & 902 (14) December 1, 2017 (13) Certified Records Generated by an Electronic Process or System (14) Certified Data Copied from an Electronic Device, Storage Medium, or File.
53 Legal Issues FRE 902(13) Certified Records Generated by an Electronic Process or System. A record generated by an electronic process or system that produces an accurate result, as shown by a certification of a qualified person that complies with the certification requirements of Rule 902(11) or (12). The proponent must also meet the notice requirements of Rule 902(11).
54 Legal Issues FRE 902 (14) Certified Data Copied from an Electronic Device, Storage Medium, or File. Data copied from an electronic device, storage medium, or file, if authenticated by a process of digital identification, as shown by a certification of a qualified person that complies with the certification requirements of Rule 902(11) or (12). The proponent also must meet the notice requirements of Rule 902(11).
55 FRE 902(14) Certification Doesn t necessarily require producing a witness Certification from a person with knowledge that the evidence is authentic Use of hash values (colloquially digital fingerprint )
56 FRE 902(14) Under the new Rule 902(14) self-authentication of ESI is permitted with a certification from a qualified person that the hash value of evidence was checked against the original and it was identical f9ebd7478fba b050ed6b4612f f9ebd7478fba b050ed6b4612f0
57 FRE 902(14) The Committee also made clear that even though ESI is self authenticating, it still remains susceptible to other evidentiary objections such as hearsay and relevance.
58
59
60 Legal Issues Authentication State of Connecticut v Eleck (2011 WL (Conn.App. 2011)) Rejected printouts of FaceBook pages incumbent on the party seeking to admit the social media data to offer detailed circumstantial evidence that tends to authenticate the unique medium of social media. State v Tienda (5358 S.W.3d 633 (Tx.App.2012)) Prosecution successfully admitted key MySpace evidence over defendant s objection based upon circumstantial evidence, including: Relevant Metadata Fields Other MySpace pages of same defendant, User of same username, nickname and addresses User ID Stated location, Communications with other suspects and Posted photos with associated date and time stamps
61 Privacy Issues Public vs Private Profiles Public: None Private: How do you get to the data? Friend request? Ethical Rules vary lots of contradiction and confusion Ohio s Model Rule of Professional Conduct would seem to prohibit this.
62 Privacy Issues Provider s Privacy Settings Change FaceBook is notorious for this What expectation of privacy does the individual have? What historical record exists showing that the information was once protected but a change in the provider s settings have made it available? What affect will Cambridge Analytica have?
63 Approach Needs to incorporate: Authentication / Admissibility Privacy Concerns Technical Issues Identification of Appropriate Source for Collecting the Data
64 Closing Thoughts: What to do when faced with Electronic Data Involve Digital Forensic Expert early Ability to plan discovery strategy Ensure admissibility Work closely with client
65 And the number 1 reason If you think hiring an Expert is expensive wait until you ve hired an amateur!
66 Vestige Digital Investigations Electronic Evidence Experts We Turn Digital Evidence into Intelligence TM Digital Forensics CyberSecurity ESI Discovery Services Damon S. Hacker, MBA, CCE, CISA, CFSX Cleveland Columbus Pittsburgh
Using Digital Forensics to Identify & Investigate Fraud
Using Digital Forensics to Identify & Investigate Fraud Presenter: Damon Hacker, MBA, CCE, CISA President Vestige Digital Investigations Ves tige (véŝ tĭj) n. 1. A visible trace, evidence or sign of something
More informationCian Kinsella CEO, Digiprove
Cian Kinsella CEO, Digiprove cian.kinsella@digiprove.com Malaga 7 th June 2013 Been developing software since 1972 Commercial and Freelance Co-founder of 3 Software Product Companies Have had many different
More information#Admissibility: Getting Social Media Evidence into the Record
#Admissibility: Getting Social Media Evidence into the Record Paul Singer Deputy Chief Consumer Protection Division Texas Attorney General s Office Paul.Singer@texasattorneygeneral.gov Brad Schuelke AAG,
More informationIntroduction to Twitter
Introduction to Twitter Objectives After completing this class you will be able to: Identify what Twitter is Create a Twitter Account Customize your Twitter profile and settings Follow other users on Twitter
More informationELECTRIC APP - PRIVACY POLICY
By accessing the website at http://electricchats.com ( Electric Site ) or any Electric mobile application (e.g., Electric ios, or Electric Android,) ( Electric App ) (collectively, the Electric Service
More informationMatt Danner Flashback Data
Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods
More informationFPKIPA CPWG Antecedent, In-Person Task Group
FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent
More informationAUTHENTICATION OF ELECTRONICALLY STORED EVIDENCE
AUTHENTICATION OF ELECTRONICALLY STORED EVIDENCE SHARON N. PRUITT Assistant Attorney General Juvenile Crime Intervention P.O. Box 12548 Austin, TX 78711-2548 (512) 936-6406 sharon.pruitt@texasattorneygeneral.gov
More informationMUG NNAPLES MACFRIENDS USER GROUP
Preparing for your Digital Afterlife Monday December 10, 2018 MUG NNAPLES MACFRIENDS USER GROUP About Jeff Bohr, owner of Naples Mac Help I have been using the Mac platform since 1986, and began using
More informationSocial Media Tools. March 13, 2010 Presented by: Noble Studios, Inc.
March 13, 2010 Presented by: Noble Studios, Inc. 1 Communication Timeline 2 Familiar Social Media Sites According to Facebook, more than 1.5 million local businesses have active pages on Facebook According
More informationSnap Inc. Law Enforcement Guide
Snap Inc. Law Enforcement Guide Last Updated: April 27, 2018 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snap Inc. 63 Market Street
More informationTOP ETF PICKS PRIVACY NOTICE Last updated October 2018
TOP ETF PICKS PRIVACY NOTICE Last updated October 2018 INTRODUCTION Thank you for choosing to be part of our community at TopETFpicks ( company, we, us, or our ). We are committed to protecting your personal
More informationTwitter Basics at the Deerfield Public Library
Twitter Basics at the Deerfield Public Library Class Outline: 1) What is Twitter? 2) Setting up an account and profile 3) Terms you should know & examples 4) How do I decide what to write? 5) Q & A Expected
More informationDIGITAL EVIDENCE TOOL BOX
DIGITAL EVIDENCE TOOL BOX Toolbox Page 1 of 23 Introduction This guide is meant to provide a basic understanding of the industry standards, best practices and practical applications for the use of digital
More informationBADGECERT SHARING GUIDE - URL
BADGECERT SHARING GUIDE - URL About BadgeCert Just completed a continuing education course? Achieve certification in your industry area? Welcome to the world of BadgeCert. Our company works with your verified
More informationTrends in Mobile Forensics from Cellebrite
Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with
More informationMarketing & Back Office Management
Marketing & Back Office Management Menu Management Add, Edit, Delete Menu Gallery Management Add, Edit, Delete Images Banner Management Update the banner image/background image in web ordering Online Data
More informationDiscover (n.): This feature surfaces personalized content tailored to your interests.
Glossary: General Terms @: The @ sign is used to call out usernames in Tweets: "Hello @twitter!" People will use your @username to mention you in Tweets, send you a message or link to your profile. @username:
More informationSOCIAL MEDIA. Charles Murphy
SOCIAL MEDIA Charles Murphy Social Media Overview 1. Introduction 2. Social Media Areas Blogging Bookmarking Deals Location-based Music Photo sharing Video 3. The Fab Four FaceBook Google+ Linked In Twitter
More informationSocial Media Reputation Management
Social Media Reputation Management If you are using social media sites such as Facebook or Twitter, there are some simple steps you can take to manage your reputation and protect your identity. Even if
More informationOHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE
OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:
More information3. How is technology used to serve our advertisements on other Sites that you visit and what choices do you have?
Privacy Policy for U.S. Websites Scope. This Privacy Policy applies to personal information collected online, used and disclosed by Stanley Black & Decker, Inc. s affiliates including but not limited to
More informationSecurity. Protect your business from security threats with Pearl Technology. The Connection That Matters Most
Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to
More informationA Guide to using Social Media (Facebook and Twitter)
A Guide to using Social Media (Facebook and Twitter) Facebook 1. Visit www.facebook.com 2. Click the green Sign up button on the top left-hand corner (see diagram below) 3. Enter all the information required
More informationGetting Started with Social Media
Getting Started with Social Media Step 1: Go to www.facebook.com Step 2: Fill out the Sign Up form located on the homepage, including full name, e-mail address, a password and birthday, to start a free
More informationDSS User Group. December Google+ Local, Pages, Profiles
DSS User Group December 2012 Google+ Local, Pages, Profiles DSS User Group December 2012 Agenda Google+ Google+ - What It Is, Why It Matters Google+ Profiles Google+ Pages Google+ Local How to view traffic
More informationSolv3D Privacy Policy
Solv3D Inc. ( Solv3D, We, Us, or Our ) is committed to transparency in the collection and use of your personal information. The Privacy Policy below describes how we collect and use personal information,
More informationDigital Forensics for Attorneys
Lars E. Daniel, EnCE, ACE, AME, CTNS Digital Forensics Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital
More informationUnderstanding Computer Forensics
Understanding Computer Forensics also known as: How to do a computer forensic investigation... and not get burned Nick Klein SANS Canberra Community Night 11 February 2013 The scenario... Your boss tells
More informationWeb Services Privacy Policy. What the Privacy Policy does. What the Privacy Policy does not do
Web Services Privacy Policy Revised and Effective: April 14, 2017 What the Privacy Policy does The Web Services Privacy Policy describes the information Spartan Net collects about you when you use any
More informationDocumenting a Digital Forensic Investigation - Guide
Contents How to Setup Forensic Notes to Document Your Investigations... 2 Creating Folders... 3 Deleting a Folder... 6 Creating Nested Folders... 8 Notetaking: Intake Officer... 9 Creating a Notebook...
More informationPRIVACY POLICY TABLE OF CONTENTS. Last updated October 05, 2018
PRIVACY POLICY Last updated October 05, 2018 Thank you for choosing to be part of Vistalytics Inc., ( Company, we, us, or our ). We are committed to protecting your personal information and your right
More informationCyber Security Ethics at the Boundaries: Systems Maintenance and the Tallinn Manual. Sandra Braman
Cyber Security Ethics at the Boundaries: Systems Maintenance and the Tallinn Manual Sandra Braman The Argument Points of disagreement among the international group of experts responsible for the Tallinn
More informationGetting started with social media and comping
Getting started with social media and comping Promotors are taking a leap further into the digital age, and we are finding that more and more competitions are migrating to Facebook and Twitter. If you
More informationSOCIAL MEDIA 101. Learn the basics of social media to effectively communicate with the public you serve.
SOCIAL MEDIA 101 Learn the basics of social media to effectively communicate with the public you serve. FACEBOOK and TWITTER Which social media platforms, if any, does your County currently utilize to
More informationDigital Evidence for the Domestic Practitioner
Digital Evidence for the Domestic Practitioner Presented by: Simon Ragona III, EnCE, CCE, ACE, Director Kyle Poppenwimer, CCE, ACE, Senior Digital Forensic Examiner T&M Protection Resources, LLC 230 Park
More informationETSY.COM - PRIVACY POLICY
At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,
More informationDIGITAL MARKETING AND SOCIAL MEDIA COMMUNICATION FOR THE NSS EPALE CY TEAM AND STAKEHOLDERS
DIGITAL MARKETING AND SOCIAL MEDIA COMMUNICATION FOR THE NSS EPALE CY TEAM AND STAKEHOLDERS 6 και 7 Ιουνίου, 8:00 π.μ.-15:00 μ.μ. Παιδαγωγικό Ινστιτούτο Κύπρου, Αίθουσα Π206 THE SEMINAR WAS HELD DURING
More informationA forensically robust method for acquisition of icloud data. Kurt Oestreicher Champlain College
A forensically robust method for acquisition of icloud data Kurt Oestreicher Champlain College Background Data stored on cloud services increasingly important to forensic investigations As of June 2013:
More informationEmployee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC
Employee Privacy, Digital Evidence, and the CFE Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC The Good Old Days CFE s Aerial View 1. What Information
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is
More informationFinancial Forensic Accounting
Financial Forensic Accounting Qualification Scope of Content Version: as at 02 March 2018 6. SCOPE OF CONTENT 1. Digital forensics overview 1.1. History of digital forensics 1.2. Sources of electronic
More informationComputer forensics Aiman Al-Refaei
Computer forensics Aiman Al-Refaei 29.08.2006 Computer forensics 1 Computer forensics Definitions: Forensics - The use of science and technology to investigate and establish facts in criminal or civil
More informationE-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.
E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal
More informationCreate an Account... 2 Setting up your account... 2 Send a Tweet... 4 Add Link... 4 Add Photo... 5 Delete a Tweet...
Twitter is a social networking site allowing users to post thoughts and ideas in 140 characters or less. http://www.twitter.com Create an Account... 2 Setting up your account... 2 Send a Tweet... 4 Add
More informationAdobe Sign and 21 CFR Part 11
Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted
More informationKIK s GUIDE FOR LAW ENFORCEMENT
Thanks for checking out our law enforcement guide. We take the safety of our users very seriously, and we hope this guide will be a useful tool for you. It includes information about our app; the features
More informationUSE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY
Peer to Peer Networking BitTorrent, a popular peer to peer networking software, can be downloaded for free from the BitTorrent website. Once the user has installed the program on their computer, they can
More informationSocial Media Workshop
Social Media Workshop RHS Wisley, 21 March 2017 Social: interacting with other people, sharing information with them & receiving information from them. + Media: instrument of communication, like the internet,
More informationPayThankYou LLC Privacy Policy
PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the
More informationCellular Telephone and Social Media Subpoena Guide updated May 2015
Cellular Telephone and Social Media Subpoena Guide updated May 2015 The chart below contains the contact information for the Centers for a few major cell phone companies and social media networks. These
More informationPrivacy Policy. Optimizely, Inc. 1. Information We Collect
Privacy Policy Posted: Nov. 19, 2015; Effective Date: Nov. 19, 2015 Optimizely, Inc. This privacy policy applies to Optimizely s Virtual Experience website owned and/or operated for Optimizely, Inc., currently
More informationDigital Forensics UiO
Digital Forensics UiO About Me I am: Eivind Utnes, M.Sc. I work for: Watchcom Security Group AS I work as: Information Security Consultant Security Audits Digital Forensics / Incident Response Education
More informationMEMA. Memory Management for Museum Exhibitions. Independent Study Report 2970 Fall 2011
MEMA Memory Management for Museum Exhibitions Independent Study Report 2970 Fall 2011 Author: Xiaoning Bai Yuanyuan Ye Supervisors: Dr. Peter Brusilovsky, Yiling Lin Part I. Introduction to MEMA MEMA is
More informationInternet Applications. Q. What is Internet Explorer? Explain features of Internet Explorer.
Internet Applications Q. What is Internet Explorer? Explain features of Internet Explorer. Internet explorer: Microsoft Internet Explorer is a computer program called a browser that helps you interact
More informationDigital Forensics UiO. Digital Forensics in Incident Management. About Me. Outline. Incident Management. Finding Evidence.
Digital Forensics UiO Outline Incident Management Digital Forensics Finding Evidence 3 About Me I am: Eivind Utnes, M.Sc. I work for: Watchcom Security Group AS I work as: Information Security Consultant
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of
More informationUSE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY
TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to
More informationDigital Forensics UiO
Digital Forensics UiO About Me I am: Eivind Utnes, M.Sc. I work for: Watchcom Security Group AS I work as: Head of Security Senior Information Security Consultant Security Audits Digital Forensics / Incident
More informationChapter 7 Forensic Duplication
Chapter 7 Forensic Duplication Ed Crowley Spring 11 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool
More informationDigital Forensics UiO
About Me I am: Eivind Utnes, M.Sc. I work for: Watchcom Security Group AS Digital Forensics UiO I work as: Head of Security Senior Information Security Consultant Security Audits Digital Forensics / Incident
More informationPrivacy Policy. Information we collect about you
Privacy Policy Briefly.co.za ( we, and us ) respects the privacy of its users and has developed this Privacy Policy to demonstrate its commitment to protecting your privacy. This Privacy Policy describes
More informationMEMORANDUM. TO: '''''''' '''''''''''''''''''''''''''''', Colorado Legal Services, Grand Junction Office
MEMORANDUM TO: '''''''' '''''''''''''''''''''''''''''', Colorado Legal Services, Grand Junction Office FROM: ''''''''''''' ''''''''''''''''''''', University of Colorado Law School RE: Admission of Facebook
More informationGRANDSTREAM PRIVACY STATEMENT
GRANDSTREAM PRIVACY STATEMENT This Privacy Statement governs how Grandstream Networks, Inc. and its affiliates ( Grandstream, us, our or we ) may collect, use, and disclose information that we obtain through
More informationTITLE SOCIAL MEDIA AND COLLABORATION POLICY
DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the
More informationetouches, Inc. Privacy Policy
etouches, Inc. Privacy Policy Effective Date: March 1, 2017 This privacy policy applies to etouches, Inc. ( etouches ) and covers the site, www.etouches.com corporate site and application(s) accessed via
More informationChapter 7 Forensic Duplication
Chapter 7 Forensic Duplication Ed Crowley Spring 10 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool
More informationWORDPRESS. Log in here: ADDING THE INSTRUCTOR AS A USER
WORDPRESS Log in here: http://www.quiltworx.com/wp-login ADDING THE INSTRUCTOR AS A USER Once logged in, you will be brought to the WP Dashboard screen. Hover over Users in the left column, then click
More informationWhen this policy mentions WanderJaunt, we, us, or our, it refers to the WanderJaunt, Inc.
WanderJaunt Privacy Policy Last Updated: June 20, 2018 Thank you for using WanderJaunt! This Privacy Policy describes how we collect, use, process, and disclose your information, including personal information,
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationThe Trustworthiness of Digital Records
The Trustworthiness of Digital Records International Congress on Digital Records Preservation Beijing, China 16 April 2010 1 The Concept of Record Record: any document made or received by a physical or
More informationMaximizing the Business Value of Social Sites
Maximizing the Business Value of Social Sites How to Work with Twitter (nuances & timeframe): Twitter is known as a 'real time social networking' site, a place for sharing information as it happens, and
More informationPRIVACY POLICY OUR SERVICES. Last modified: November 29, 2015
PRIVACY POLICY Last modified: November 29, 2015 Thank you for using Creatubbles. Creatubbles PTE. LTD and its affiliates ( Creatubbles ) values your privacy, and we want you to know what information we
More informationGetting Started with the Aloha Community Template for Salesforce Identity
Getting Started with the Aloha Community Template for Salesforce Identity Salesforce, Winter 18 @salesforcedocs Last updated: November 30, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved.
More informationTrusted Profile Identification and Validation Model
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 1 (May 2013), PP. 01-05 Himanshu Gupta 1, A Arokiaraj Jovith 2 1, 2 Dept.
More informationLecture 41 Blockchain in Government III (Digital Identity)
Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III
More informationLocation Based Services Privacy Check In
Location Based Services Privacy Check In Is the location based feature required? Does the service use GPS or the like when you check in or tweet? Can a friend update your location? OBTAINING LOCATION INFORMATION
More informationBADGECERT SHARING GUIDE - URL
BADGECERT SHARING GUIDE - URL About BadgeCert Just completed a continuing education course? Achieve certification in your industry area? Welcome to the world of BadgeCert. Our company works with your verified
More informationSocial Security Number Protection Policy.
Privacy HIPAA Notice of Privacy Practices. Website Privacy Policy. Social Security Number Protection Policy. HIPAA Notice of Privacy Practices: To read more about our privacy practices regarding health
More information1 BADGE EARNER GUIDE
BADGE EARNER GUIDE 1 2 Welcome to Acclaim Welcome to a new way of managing your professional achievements and learning outcomes: badging, through Acclaim. Acclaim is a badging platform backed by Pearson,
More informationDECENTRALIZED SOCIAL NETWORKING WITH WORDPRESS. November 7, 2018 WordPress Meetup Vienna Alex Kirk
DECENTRALIZED SOCIAL NETWORKING WITH WORDPRESS DECENTRALIZED? Centralized = control is with a single entity If you use Facebook, the servers are all controlled by Facebook Inc. Facebook can draw conclusions
More informationEXPERT WITNESS: Completion of a perfect circle
An Agency Under MOSTI EXPERT WITNESS: Completion of a perfect circle Cyber Forensics Workshop, Doha,Qatar February 21, 2008 By R.Azrina R.Othman CyberSecurity Malaysia Copyright 2008 CyberSecurity Malaysia
More informationPrivacy Policy. Last Updated: August 2017
Privacy Policy Last Updated: August 2017 Here at ConsenSys we know how much you value privacy, and we realize that you care about what happens to the information you provide to us through our website,
More informationDuncanPowell RESTRUCTURING TURNAROUND FORENSIC
Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017 DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationGrowing Consumer Clash with Photo-Sharing: Privacy vs. Tech Giants Cool, Convenience
Growing Consumer Clash with Photo-Sharing: Privacy vs. Tech Giants Cool, Convenience 1 Photo-sharing report Methodology Americans are concerned about online privacy and security and are taking steps to
More informationONLINE EVALUATION FOR: Company Name
ONLINE EVALUATION FOR: Company Name Address Phone URL media advertising design P.O. Box 2430 Issaquah, WA 98027 (800) 597-1686 platypuslocal.com SUMMARY A Thank You From Platypus: Thank you for purchasing
More informationUsing Social Media and New Media Technologies in Fundraising
Using Social Media and New Media Technologies in Fundraising Presented by: Maria Semple, The Prospect Finder LLC Copyright 2013 The Prospect Finder LLC The Options Seem Endless.. 1.15 billion monthly active
More informationHow to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO
How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty
More informationCRYPTALGO HOLDINGS AG - Privacy Policy page 1 of 5
page 1 of 5 1.1 Privacy Policy 1.2 Cryptalgo Holdings AG ("CRYPTALGO" or "We") is committed to protecting your privacy. In this notice, you can read about the information we collect from you when you visit
More informationBrainCert Enterprise LMS. Learning Management System (LMS) documentation Administrator Guide Version 3.0
BrainCert Enterprise LMS Learning Management System (LMS) documentation Administrator Guide Version 3.0 1 P a g e Table of Contents... 3... 3... 4... 4... 5... 5... 6... 6... 8... 8... 9... 9... 10...
More informationTest Plan and Cases (TPC)
Test Plan and Cases (TPC) LiveRiot Video Editing System and social networking enhancement Team 04 Yang Li Haoyu Huang Project anager, Life Cycle Planner Feasibility Engineer, System Architect Ye Tian Zichuan
More informationDROPBOX.COM - PRIVACY POLICY
Dropbox Privacy Policy Last Modified: October 15, 2012 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access the Dropbox service
More informationCRM Insights. User s Guide
CRM Insights User s Guide Copyright This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
More informationYou can return this form to it by post, fax or .
Electoral Register: When you register to vote, be sure to opt out of the edited (open) version of the Electoral Register. If you have already registered in this electoral cycle, you can also contact your
More informationTECHNICAL EVIDENCE IN STALKING PROSECUTIONS
TECHNICAL EVIDENCE IN STALKING PROSECUTIONS Where to Get It and How to Get It In SUPPORT This project was supported by Grant No. 2009-TA-AX-K024 awarded by the U.S. Department of Justice, Office on Violence
More informationDigital Marketing Proposal
Digital Marketing Proposal ---------------------------------------------------------------------------------------------------------------------------------------------- 1 P a g e We at Tronic Solutions
More informationOpen Federated Social Networks Oscar Rodríguez Rocha
Open Federated Social Networks Oscar Rodríguez Rocha 178691 Federated document database Documents are stored on different servers Access through browsers Any individual, company, or organization can own
More informationPRIVACY AND ONLINE DATA: CAN WE HAVE BOTH?
PAPER PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH? By Peter Varhol www.actian.com ignificant change has arrived in how computing and storage consumes data concerning individuals. Merchants, data collection
More informationChatter Answers Implementation Guide
Chatter Answers Implementation Guide Salesforce, Summer 18 @salesforcedocs Last updated: July 26, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
More information